The collection contains journal articles, conference proceedings articles, books and book chapters, and more written by the faculty at the Singapore Management University School of Computing and Information Systems (SCIS). The school was formerly known as School of Information Systems (SIS) and was renamed in 2021. The school research areas include Data science & engineering, Cybersecurity, Information systems & management, Intelligent systems & optimisation, Software & cyber-physical systems. SCIS is also focused on innovative research and education in Information Systems and Management, data management and analytics, as well as problems and issues at the intersection of information systems related technology and management, which includes urban systems and operations, active citizenry and communities, safety and security.

Follow

Submissions from 2023

PDF

AutoConf: Automated configuration of unsupervised learning systems using metamorphic testing and Bayesian optimization, Lwin Khin SHAR, GOKNIL Arda, Erik Johannes HUSOM, Sagar Sen SEN, Naing Tun YAN, and Kisub KIM Conference Proceeding Article

PDF

AutoDebloater: Automated android app debloating, Jiakun LIU, Xing HU, Thung Ferdian, Shahar MAOZ, Eran TOCH, Debin GAO, and David LO Conference Proceeding Article

PDF

Automated question title reformulation by mining modifcation logs from Stack Overflow, Ke LIU, Xiang CHEN, Chunyang CHEN, Xiaofei XIE, and Zhanqi CUI Journal Article

PDF

Carbon-aware mine planning with a novel multi-objective framework, NURUL ASYIKEEN BINTE AZHAR, Aldy GUNAWAN, Shih-Fen CHENG, and Erwin LEONARDI Conference Proceeding Article

PDF

Constrained multiagent reinforcement learning for large agent population, Jiajing LING, Arambam James SINGH, Duc Thien NGUYEN, and Akshat KUMAR Conference Proceeding Article

PDF

Continual collaborative filtering through gradient alignment, Dinh Hieu DO and Hady Wirawan LAUW Conference Proceeding Article

PDF

Edge Distraction-aware Salient Object Detection, Sucheng REN, Wenxi LIU, Jianbo JIAO, Guoqiang HAN, and Shengfeng HE Journal Article

PDF

EndWatch: A practical method for detecting non-termination in real-world software, Yao ZHANG, Xiaofei XIE, Yi LI, Sen CHEN, Cen ZHANG, and Xiaohong LI Conference Proceeding Article

PDF

Experimental comparison of features, analyses, and classifiers for Android malware detection, Lwin Khin SHAR, Biniam Fisseha DEMISSIE, Mariano CECCATO, Naing Tun YAN, David LO, Lingxiao JIANG, and Christoph BIENERT Journal Article

Link

Fair cloud auditing based on blockchain for resource-constrained IoT devices, Lei ZHOU, Anmin FU, Guomin YANG, Yansong GAO, Shui YU, and Robert H. DENG Journal Article

PDF

Fine-grained in-context permission classification for Android apps using control-flow graph embedding, Vikas Kumar MALVIYA, Naing Tun YAN, Chee Wei LEOW, Ailys Xynyn TEE, Lwin Khin SHAR, and Lingxiao JIANG Conference Proceeding Article

PDF

Generative model-based testing on decision-making policies, Zhuo LI, Xiongfei WU, Derui ZHU, Mingfei CHENG, Siyuan CHEN, Fuyuan ZHANG, Xiaofei XIE, Lei MA, and Jianjun ZHAO Conference Proceeding Article

PDF

Graph-level anomaly detection via hierarchical memory networks, Chaoxi NIU, Guansong PANG, and Ling CHEN Conference Proceeding Article

PDF

GRASP solution approach for the e-waste collection problem, Aldy GUNAWAN, Dang Viet Anh NGUYEN, Pham Kien Minh NGUYEN, and Pieter VANSTEENWEGEN Conference Proceeding Article

PDF

Hercules: Boosting the performance of privacy-preserving federated learning, Guowen XU, Xingshuo HAN, Shengmin XU, Tianwei ZHANG, Hongwei LI, Xinyi HUANG, and Robert H. DENG Journal Article

PDF

K-ST: A formal executable semantics of the structured text language for PLCs, Kun WANG, Jingyi WANG, Christopher M. POSKITT, Xiangxiang CHEN, Jun SUN, and Peng CHENG Journal Article

PDF

Literature review in the generative AI era: How to make a compelling contribution, Shan L. PAN, Rohit NISHANT, Tuure TUUNANEN, and Fiona Fui-hoon NAH Transcript

PDF

On predicting ESG ratings using dynamic company networks, Gary ANG, Zhiling GUO, and Ee-peng LIM Journal Article

PDF

Quantifying taxi drivers' behaviors with behavioral game theory, Mengyu JI, Yuhong XU, and Shih-Fen CHENG Conference Proceeding Article

PDF

Real: A representative error-driven approach for active learning, Cheng CHEN, Yong WANG, Lizi LIAO, Yueguo CHEN, and Xiaoyong DU Conference Proceeding Article

PDF

Revisiting the identification of the co-evolution of production and test code, Weifeng SUN, Meng YAN, Zhongxin LIU, Xin XIA, Yan LEI, and David LO Journal Article

PDF

RoSAS: Deep semi-supervised anomaly detection with contamination-resilient continuous supervision, Hongzuo XU, Yijie WANG, Guansong PANG, Songlei JIAN, Ning LIU, and Yongjun WANG Journal Article

PDF

TESTSGD: Interpretable testing of neural networks against subtle group discrimination, Mengdi ZHANG, Jun SUN, Jingyi WANG, and Bing SUN Journal Article

PDF

The devil is in the tails: How long-tailed code distributions impact large language models, Xin ZHOU, Kisub KIM, Bowen XU, Jiakun LIU, DongGyun HAN, and David LO Conference Proceeding Article

PDF

The power of identity cues in text-based customer service: Evidence from Twitter, Yang GAO, Huaxia RUI, and Shujing SUN Journal Article

PDF

Threshold attribute-based credentials with redactable signature, Rui SHI, Huamin FENG, Yang YANG, Feng YUAN, Yingjiu LI, Hwee Hwa PANG, and Robert H. DENG Journal Article

PDF

Uncertainty-adjusted inductive matrix completion with Graph Neural Networks, Petr KASALICKY, Antoine LEDENT, and Rodrigo ALVES Conference Proceeding Article

PDF

Understanding multi-homing and switching by platform drivers, Xiaotong GUO, Andreas HAUPT, Hai WANG, Rida QADRI, and Jinhua ZHAO Journal Article

PDF

When routing meets recommendation: Solving dynamic order recommendations problem in peer-to-peer logistics platforms, Zhiqin ZHANG, Waldy JOE, Yuyang ER, and Hoong Chuin LAU Conference Proceeding Article

Efficient Privacy-Preserving Federated Learning With Improved Compressed Sensing, Yifan. ZHANG, Yinbin. MIAO, Xinghua. LI, Linfeng. WEI, Zhiquan LIU, Kim-Kwang R. CHOO, and Robert H. DENG Journal Article

Machine learning based financial aid management process, GOTTIPATI Swapna; SHANKARARAMAN, Venky; Komirisetti C. RAO; and Vennila VETRIVILLALAN Conference Proceeding Article

Automata-guided control-flow-sensitive fuzz driver generation, Cen ZHANG, Yuekang LI, Hao ZHOU, Xiaohan ZHANG, Yaowen ZHENG, Xian ZHAN, Xiaofei XIE, Xiapu LUO, Xinghua LI, Yang Liu LIU, and Sheikh M. HABIB Conference Proceeding Article

Privacy-preserving multi-user outsourced computation for boolean circuits, Xueqiao. LIU, Guomin YANG, Willy. SUSILO, Kai. HE, Robert H. DENG, and Jian. WENG Journal Article

PDF

A certificateless designated verifier sanitizable signature, Yonghua ZHAN, Bixia YI, Yang YANG, Renjie HE, and Rui SHI Conference Proceeding Article

PDF

AI for connectivism learning: Undergraduate students’ experiences of ChatGPT in advanced programming courses, Swapna GOTTIPATI, Kyong Jin SHIM, and Venky SHANKARARAMAN Conference Proceeding Article

PDF

An adaptive large neighborhood search for heterogeneous vehicle routing problem with time windows, Minh Pham Kien NGUYEN, Aldy GUNAWAN, Vincent F. YU, and Mustafa MISIR Conference Proceeding Article

PDF

A survey on proactive dialogue systems: Problems, methods, and prospects, Yang DENG, Wenqiang LEI, Wai LAM, and Tat-Seng CHUA Conference Proceeding Article

PDF

Balancing utility and fairness in submodular maximization, Yanhao WANG, Yuchen LI, Francesco BONCHI, and Ying WANG Conference Proceeding Article

PDF

CampER: An effective framework for privacy-aware deep entity resolution, Yuxiang GUO, Lu CHEN, Zhengjie ZHOU, Baihua ZHENG, Ziquan FANG, Zhikun ZHANG, Yuren MAO, and Yunjun GAO Conference Proceeding Article

PDF

Context-aware event forecasting via graph disentanglement, Yunshan MA, Chenchen YE, Zijian WU, Xiang WANG, Yixin CAO, and Tat-Seng CHUA Conference Proceeding Article

PDF

Corporate trade war uncertainty and patent bubble, Xu YANG, Nan HU, and Peng LIANG Conference Proceeding Article

CROWDFL: Privacy-preserving mobile crowdsensing system via federated learning, Bowen ZHAO, Ximeng LIU, Wei-Neng CHEN, and Robert H. DENG Journal Article

PDF

Decoding the underlying meaning of multimodal hateful memes, Ming Shan HEE, Wen Haw CHONG, and Roy Ka-Wei LEE Conference Proceeding Article

PDF

Decompiling x86 Deep Neural Network executables, Zhibo LIU, Yuanyuan YUAN, Shuai WANG, Xiaofei XIE, and Lei MA Conference Proceeding Article

PDF

Deep weakly-supervised anomaly detection, Guansong PANG, Chunhua SHEN, Huidong JIN, and Anton VAN DEN HENGEL Conference Proceeding Article

PDF

Document-level relation extraction via separate relation representation and logical reasoning, Heyan HUANG, Changsen YUAN, Qian LIU, and Yixin CAO Journal Article

PDF

Evolve Path Tracer: Early detection of malicious addresses in cryptocurrency, Ling CHENG, Feida ZHU, Yong WANG, Ruicheng LIANG, and Huiwen LIU Conference Proceeding Article

PDF

Fintech data infrastructure for ESG disclosure compliance, Randall E. DURAN and Peter TIERNEY Journal Article

PDF

Generalization through diversity: Improving unsupervised environment design, Wenjun LI, Pradeep VARAKANTHAM, and Dexun LI Conference Proceeding Article

PDF

GRASP based metaheuristic to solve the mixed fleet e-waste collection route planning problem, Aldy GUNAWAN, Dang V.A. NGUYEN, Pham K.M. NGUYEN, and Pieter. VANSTEENWEGEN Conference Proceeding Article

PDF

Hyperbolic graph topic modeling network with continuously updated topic tree, Ce ZHANG, Rex YING, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Knowledge representation for conceptual, motivational, and affective processes in natural language communication, Seng Beng HO, Zhaoxia WANG, Boon-Kiat QUEK, and Erik CAMBRIA Conference Proceeding Article

PDF

Lean manufacturing approach to increase packaging efficiency, Lina GOZALI, Irsandy KURNIAWAN, Aldo SALIM, Iveline Anne MARIE, Benny TJAHJONO, Yun Chia LIANG, Aldy GUNAWAN, Nnovia Hardjo SIE, and Yuliani SUSENO Conference Proceeding Article

PDF

Learning to send reinforcements: Coordinating multi-agent dynamic police patrol dispatching and rescheduling via reinforcement learning, Waldy JOE and Hoong Chuin LAU Conference Proceeding Article

PDF

Mastering stock markets with efficient mixture of diversified trading experts, Shuo SUN, Xinrun WANG, Wanqi XUE, Xiaoxuan LOU, and Bo AN Conference Proceeding Article

PDF

Multi-Granularity Detector for Vulnerability Fixes, Truong Giang NGUYEN, CONG, Thanh Le, Hong Jin KANG, Ratnadira WIDYASARI, Chengran YANG, Zhipeng ZHAO, Bowen XU, Jiayuan ZHOU, Xin XIA, Ahmed E. HASSAN, David LO, and David LO Journal Article

PDF

Multi-view graph contrastive learning for solving vehicle routing problems, Yuan JIANG, Zhiguang CAO, Yaoxin WU, and Jie ZHANG Conference Proceeding Article

PDF

NumGPT: Improving numeracy ability of generative pre-trained models, Zhihua JIN, Xin JIANG, Xiangbo WANG, Qun LIU, Yong WANG, Xiaozhe REN, and Huamin QU Conference Paper

Privacy-preserving asynchronous federated learning framework in distributed IoT, Xinru YAN, Yinbin MIAO, Xinghua LI, Kim-Kwang Raymond CHOO, Xiangdong MENG, and Robert H. DENG Journal Article

PDF

Proxy hunting: Understanding and characterizing proxy-based upgradeable smart contracts in blockchains, William E III BODELL, Sajad MEISAMI, and Yue DUAN Conference Proceeding Article

PDF

Semantically constitutive entities in knowledge graphs, Chong Cher CHIA, Maksim TKACHENKO, and Hady Wirawan LAUW Conference Proceeding Article

PDF

Single-View View Synthesis with Self-rectified Pseudo-Stereo, Yang ZHOU, Hanjie WU, Wenxi LIU, Zheng XIONG, Jing QIN, and Shengfeng HE Journal Article

Slot allocation for a multiple-airport system considering airspace capacity and flying time uncertainty, Yanjun WANG, Chang LIU, Hai WANG, and Vu DUONG Journal Article

PDF

Sparsity brings vulnerabilities: Exploring new metrics in backdoor attacks, Jianwen TIAN, Kefan QIU, Debin GAO, Zhi WANG, Xiaohui KUANG, and Gang ZHAO Conference Proceeding Article

PDF

Survey on sentiment analysis: Evolution of research methods and topics, Jingfeng CUI, Zhaoxia WANG, Seng-Beng HO, and Erik CAMBRIA Journal Article

PDF

The 4th International Workshop on Talent and Management Computing (TMC'2023): Editorial, Hengshu ZHU, Hui XIONG, Yong GE, and Ee-peng LIM Conference Proceeding Article

PDF

The analysis of extended producer responsibility (EPR) for e-waste management Policy Drivers and Challenges in Singapore, Aldy GUNAWAN, Tasaporn VISAWAMETEEKUL, Aidan Marc WONG, and Linh C. TRAN Conference Proceeding Article

PDF

The future of cryptocurrency and blockchain technology in finance, Wanyi WONG and Alan @ Ali MADJELISI MEGARGEL Journal Article

PDF

The heterogeneous vehicle routing problem with multiple time windows for the e-waste collection problem, Aldy GUNAWAN, Minh P.K NGUYEN, Vincent F. YU, and Dang Viet Anh NGUYEN Conference Proceeding Article

PDF

Transferable curricula through difficulty conditioned generators, Sidney TIO and Pradeep VARAKANTHAM Conference Proceeding Article

PDF

Vehicle routing problem with parcel locker and public transportation: Goods delivery using mass-rapid-transit system, Pham K.M. NGUYEN, Vincent F. YU, and Aldy GUNAWAN Conference Proceeding Article

Comprehensive survey on privacy-preserving spatial data query in transportation systems, Yinbin MIAO, Yutao YANG, Xinghua LI, Xiangdong MENG, Robert H. DENG, and Robert H. DENG Journal Article

BehAVExplor: Behavior diversity guided testing for autonomous driving systems, Mingfei CHENG, Yuan ZHOU, and Xiaofei XIE Conference Proceeding Article

Efficient and secure Spatial Range Query over large-scale encrypted data, Yinbin MIAO, Chao XU, Yifeng ZHENG, Ximeng LIU, Xiangdong MENG, and Robert H. DENG Conference Proceeding Article

A transformer framework for generating context-aware knowledge graph paths, Pei-Chi LO and Ee-peng LIM Journal Article

The effect of online follow-up services on offline and online physician demand: Evidence from chronic disease physicians, Anqi ZHAO, Qian TANG, and Yang GAO Conference Proceeding Article

The use of bug bounty programs for software reliability improvement, Tianlu ZHOU, Dan MA, and Nan FENG Conference Proceeding Article

Uncertainty-adjusted recommendation via matrix factorization with weighted losses, Rodrigo ALVES, Antoine LEDENT, and Marius KLOFT Journal Article

A tightly secure ID-based signature scheme under DL assumption in AGM, Jia-Chng LOH, Fuchun GUO, Willy SUSILO, and Guomin YANG Conference Proceeding Article

Privacy-Aware and Security-Enhanced Efficient Matchmaking Encryption, Jianfei SUN, Guowen XU, Tianwei ZHANG, Xuehuan YANG, Mamoun ALAZAB, and Robert H. DENG Journal Article

PDF

18 million links in commit messages: purpose, evolution, and decay, Tao XIAO, Sebastian BALTES, Hideaki HATA, Christoph TREUDE, Raula KULA, Takashi ISHIO, and Kenichi MATSUMOTO Journal Article

PDF

A comprehensive study on quality assurance tools for Java, Han LIU, Sen CHEN, Ruitao FENG, Chengwei LIU, Kaixuan LI, Zhengzi XU, Liming NIE, Yang LIU, and Yixiang CHEN Conference Proceeding Article

PDF

Adaptive split-fusion transformer, Zixuan SU, Jingjing CHEN, Lei PANG, Chong-wah NGO, and Yu-Gang JIANG Conference Proceeding Article

PDF

A data-driven approach for scheduling bus services subject to demand constraints, BRAHMANAGE JANAKA CHATHURANGA THILAKARATHNA, Thivya KANDAPPU, and Baihua ZHENG Journal Article

PDF

A hierarchical optimization approach for dynamic pickup and delivery problem with LIFO constraints, Jianhui DU, Zhiqin ZHANG, Xu WANG, and Hoong Chuin LAU Journal Article

PDF

A Lightweight Privacy-preserving Path Selection Scheme in VANETs, Guojun WANG and Huijie YANG Journal Article

PDF

An efficient hybrid genetic algorithm for the quadratic traveling salesman problem, Quang Anh PHAM, Hoong Chuin LAU, Minh Hoang HA, and Lam VU Conference Proceeding Article

PDF

Augmenting low-resource text classification with graph-grounded pre-training and prompting, Zhihao WEN and Yuan FANG Conference Proceeding Article

PDF

A unified multi-task learning framework for multi-goal conversational recommender systems, Yang DENG, Wenxuan ZHANG, Weiwen XU, Wenqiang LEI, Tat-Seng CHUA, and Wai LAM Journal Article

PDF

Balancing privacy and flexibility of cloud-based personal health records sharing system, Yudi ZHANG, Fuchun GUO, Willy SUSILO, and Guomin YANG Journal Article

PDF

Barriers and self-efficacy: A large-scale study on the impact of OSS courses on student perceptions, Larissa SALERNO, Simone DE FRANÇA TONHÃO, Igor STEINMACHER, and Christoph TREUDE Conference Proceeding Article

PDF

Beyond "protected" and "private": An empirical security analysis of custom function modifiers in smart contracts, Yuzhou FANG, Daoyuan WU, Xiao YI, Shuai WANG, Yufan CHEN, Mengjie CHEN, Yang LIU, and Lingxiao JIANG Conference Proceeding Article

PDF

BinAlign: Alignment Padding Based Compiler Provenance Recovery, MALIHA ISMAIL, Yan LIN, DongGyun HAN, and Debin GAO Conference Proceeding Article

PDF

ChatGPT, can you generate solutions for my coding exercises? An evaluation on its effectiveness in an undergraduate Java programming course, Eng Lieh OUH, Benjamin GAN, Kyong Jin SHIM, and Swavek WLODKOWSKI Conference Proceeding Article

PDF

CHEER: Centrality-aware high-order event reasoning network for document-level event causality identification, Meiqi CHEN, Yixin CAO, Yan ZHANG, and Zhiwei LIU Conference Proceeding Article

PDF

CONE: An efficient COarse-to-fiNE alignment framework for long video temporal grounding, Zhijian HOU, Wanjun ZHONG, Lei JI, Difei GAO, Kun YAN, Wing-Kwong CHAN, Chong-Wah NGO, Mike Z. SHOU, and Nan. DUAN Conference Proceeding Article

PDF

Conference report on 2022 IEEE symposium series on computational intelligence (IEEE SSCI 2022), Ah-hwee TAN, Dipti SRINIVASAN, and Chunyan MIAO Magazine Article

PDF

Context-aware neural fault localization, Zhuo ZHANG, Xiaoguang MAO, Meng YAN, Xin XIA, David LO, and David LO Journal Article

PDF

Contrastive video question answering via video graph transformer, Junbin Xiao XIAO, Pan ZHOU, Angela YAO, Yicong LI, Richang HONG, Shuicheng YAN, and Tat-Seng CHUA Journal Article

Cross-market information transmission along the supply chain network, Ruiui FANG, Nan HU, Peng LIANG, and Ling LIU Journal Article